From owner-freebsd-questions@FreeBSD.ORG Thu May 1 18:20:05 2008 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id AEAF41065676 for ; Thu, 1 May 2008 18:20:05 +0000 (UTC) (envelope-from kdk@daleco.biz) Received: from ezekiel.daleco.biz (southernuniform.com [66.76.92.18]) by mx1.freebsd.org (Postfix) with ESMTP id 9A0A08FC1E for ; Thu, 1 May 2008 18:20:04 +0000 (UTC) (envelope-from kdk@daleco.biz) Received: from localhost (localhost [127.0.0.1]) by ezekiel.daleco.biz (8.13.8/8.13.8) with ESMTP id m41Hu8FB057986; Thu, 1 May 2008 12:56:08 -0500 (CDT) (envelope-from kdk@daleco.biz) X-Virus-Scanned: amavisd-new at daleco.biz Received: from ezekiel.daleco.biz ([127.0.0.1]) by localhost (ezekiel.daleco.biz [127.0.0.1]) (amavisd-new, port 10024) with LMTP id M74yBh5rM6Hn; Thu, 1 May 2008 12:56:05 -0500 (CDT) Received: from archangel.daleco.biz (dsl.daleco.biz [209.125.108.70]) by ezekiel.daleco.biz (8.13.8/8.13.8) with ESMTP id m41Hu2DX057979; Thu, 1 May 2008 12:56:03 -0500 (CDT) (envelope-from kdk@daleco.biz) Message-ID: <481A043D.6020508@daleco.biz> Date: Thu, 01 May 2008 12:56:13 -0500 From: Kevin Kinsey User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.8.1.11) Gecko/20080213 SeaMonkey/1.1.7 MIME-Version: 1.0 To: ervin References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: freebsd-questions@freebsd.org Subject: Re: PHP5 install error X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 01 May 2008 18:20:05 -0000 ervin wrote: > hi > made a portsnap fetch update .... but I still get this error ---- ideas? > portaudit shows the vulnerability ... but that should be included in > the port or? > > Error: > make clean && make install > ===> Cleaning for php5-5.2.5_1 > ===> php5-5.2.5_1 has known vulnerabilities: > => php -- integer overflow vulnerability. > Reference: > => Please update your ports tree and try again. > *** Error code 1 > > Stop in /var/ports/lang/php5. > > mvh/best regards ervin 1. Wait until the PHP port gets updated. 2. OR, uninstall portaudit and throw all sheets to the wind. 3. OR, read the appropriate manpage for either ports(7) or portaudit and determine how to override the portaudit check. I've not got portaudit installed on this box, and ports(7) is a rather long manpage, so I'll leave this exercise to the reader. Oh, and <#include disclaimer.h> and all that.... HTH, Kevin Kinsey -- FORCE YOURSELF TO RELAX!